Description
It was found that Keycloak oauth would permit an authenticated resource to obtain an access/refresh token pair from the authentication server, permitting indefinite usage in the case of permission revocation. An attacker on an already compromised resource could use this flaw to grant himself continued permissions and possibly conduct further attacks.
Remediation
References
https://access.redhat.com/errata/RHSA-2017:2904
https://access.redhat.com/errata/RHSA-2017:2905
https://access.redhat.com/errata/RHSA-2017:2906
https://bugzilla.redhat.com/show_bug.cgi?id=1484154
Related Vulnerabilities
CVE-2020-7681 Vulnerability in npm package marscode
CVE-2019-19771 Vulnerability in npm package wallet-address-validtaor
CVE-2020-28281 Vulnerability in npm package set-object-value
CVE-2020-24616 Vulnerability in maven package com.fasterxml.jackson.core:jackson-databind
CVE-2022-21126 Vulnerability in maven package com.github.samtools:htsjdk